• Title/Summary/Keyword: Protocol developing

Search Result 427, Processing Time 0.052 seconds

Development and Evaluation of e-EBPP(Evidence-Based Practice Protocol) System for Evidence-Based Dementia Nursing Practice (근거중심 치매 간호실무를 위한 e-EBPP 시스템 개발 및 평가)

  • Park, Myonghwa
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.3
    • /
    • pp.411-424
    • /
    • 2005
  • Purpose: The purpose of this study was to develop and evaluate e-EBPP(Evidence-based Practice Protocol) system for nursing care for patients with dementia to facilitate the best evidence-based decision in their dementia care settings. Method: The system was developed based on system development life cycle and software prototyping using the following 5 processes: Analysis, Planning, Developing, Program Operation, and Final Evaluation. Result: The system consisted of modules for evidence-based nursing and protocol, guide for developing protocol, tool for saving, revising, and deleting the protocol, interface tool among users, and tool for evaluating users' satisfaction of the system. On the main page, there were 7 menu bars that consisted of Introduction of site, EBN info, Dementia info, Evidence Based Practice Protocol, Protocol Bank, Community, and Site Link. In the operation of the system, HTML, JavaScript, and Flash were utilized and the content consisted of text content, interactive content, animation, and quiz. Conclusion: This system can support nurses' best and cost-effective clinical decision using sharable standardized protocols consisting of the best evidence in dementia care. In addition, it can be utilized as an e-learning program for nurses and nursing students to learn use of evidence based information.

  • PDF

Protocol developing : A Systematic Review of Randomized Controlled Trials in Tinnitus - a Focus on Methods of Outcome Measurement (프로토콜 : 이명에 대한 무작위대조임상시험의 체계적 문헌 고찰 - 결과 측정 방법을 중심으로)

  • Lee, Dong-Hyo;Lee, Jung-Hun;Oh, Yong-Leol;Kim, Nam-Kwen
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.22 no.2
    • /
    • pp.186-191
    • /
    • 2009
  • 목적 : 체계적 문헌고찰(Systematic Review)은 Protocol 개발과 Review로 구분되며, 본 연구는 국내외 의학논문 검색엔진에 등재된 이명증의 RCT 문헌들을 대상으로 평가지표를 추출하는 Systematic Review를 진행하기 위한 Protocol의 개발을 목적으로 함. 방법 : 문헌고찰을 위한 각 과정들 및 연구에 필요한 사전 결정 인자 들을 연구자 회의와 체계적 문헌고찰 protocol 개발 방식에 근거하여 개발함. 결과 : Outcome measurement의 추출을 위한 Systermatic Review의 진행에 적합한 database의 선정, 각 database에 적합한 검색식, 검색기간, 논문의 선정 및 제외기준, PICO(patient, intervention, comparator, outcome) form의 개발, 질 평가의 근거기준, 각 연구자의 역할, data의 취합 및 분석 방법 등의 결과를 개발하고 결정하였음. 결론 : 이상에서 과정에서 도출된 결과에 근거하여, 향후 Outcome measurement 추출을 위한 Review를 진행하고 차후 Review논문으로 발표할 예정임.

  • PDF

Develpoment of Automatic Meter Reading Program for Electronic Power Meter (전자식 전력량계용 한전 프로토콜 및 운영 프로그램 개발)

  • Yu, In-H.;Jang, Mun-J.;Hyun, Duk-H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2219-2221
    • /
    • 2001
  • A communication protocol for automatic meter reading is designed for electronic power meter. Communicational functions and data structures are standardized and data reading software is developed according to the developed protocol. The communication protocol is designed with reference specifications, IEC 62056-31 and Distributed Network Protocol(DNP). For design, communicational functions and specifications of the industrial meters were analyzed for the purpose of developing a new one for KEPCO meters. The protocol is designed with 3 layer model, physical layers, data link layer and application layer. A documentation was completed with data gathering, data classification, authentication, error detection. An emulator system was made for testing the protocol. A meter reading software was developed using the protocol. Many different protocols and meter reading softwares are integrated into one with the developed protocol and software as KEPCO's standard.

  • PDF

Analysis of regulatory action for environmental protection in International Commerce (국제교역에 있어 환경보호를 위한 규제조치의 내용 분석)

  • Lee, Jae-Young
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.379-403
    • /
    • 2009
  • The Purpose of this study is to research the problems of trade restriction for an environment protection. Environmental regulation relate to trade are Convention on International Trade in Endangered Species of Wild Fauna & Flora, Montreal Protocol on Substances that Deplete the Ozone Layer, Kyoto Protocol to the UN Framework Convention on Climate Change, Basel Convention on the Control of Transboundary Movements of Hazardous Wastes & Their Disposal, Cartagena Protocol on Biosafty and WTO Agreement. Regulatory action for environmental protection has economics instrument, command & control, liablity, damage compensation, voluntary agreement. In the case of our country, impact of regulatory action for environmental protection is low. Because is recognized position of developing country yet. For in the balance rules of trade and enviroment, First must satisfy WTO's basic principles and principle of quantitative restrictions prohibition, Second, operation of protection action must reasonable and objective standards Third, must satisfy GATT article 20 (b) clause and (g) protestation each essential factor To grow for environment advanced country, we should do i) using of FTA ii) international cooperation strengthening for developing country position iii) construction of environment information network

  • PDF

Analysis of Developing Methodology on the Security Software by Comparing Function for Security Protocol Code Generation Tools (정형명세 기법을 이용한 보안 프로토콜 코드 생성 도구의 보안 소프트웨어 개발 분석)

  • Jang Seung-Ju;Ryu Dae-hyun;Lee Chul-Sool;Park Il-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.47-56
    • /
    • 2004
  • Automatic code generating function for security protocol of SPEAR II and IFAD VDM-SL Toolbox supporting formal specification is presented in this paper. Among the functions of these tools we compare and analyze the aspects of functions, users, operation and code generation. And we suggest direction to the developing of safe security S/W. The automatic code generating function for security protocol gives the direction for developing of the safe secure software in formal specification method.

Implementation of CoAP-Lite Protocol over USN

  • Jeong, Sun-Chul;Yu, So-Ra;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.602-606
    • /
    • 2011
  • It is necessary for developing specific application protocol for mobile sensor end nodes and data collection devices that have constrained resources and computing powers. Because of these needs, IETF WG developed CoAP protocol and Internet draft was released, and processing to international standardization of this protocol. Because sensor nodes and information collection devices have restricted resources and computing powers, there are some limitations for applying to this proposed protocol directly. Thus in this paper we shows the implementation of full CoAP protocol for server, works on Linux and CoAP-Lite over telos which works on TinyOS for information collection devices. In this implementation we verified the main activities of CoAP protocol over USN by modifying some hardware with dependent algorithm.

A new Communication Protocol for a medium/small scale Distribution Automation System (중소규모 배전자동화시스템의 통신프로토콜 정립에 관한 연구)

  • Kim, Myong-Soo;Kim, Yong-Pal
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2399-2401
    • /
    • 1998
  • For a medium/small scale DAS, which using the PCS network as the system communication network, we developed the scheme of communication protocol of DAS between master and remote terminal. This paper presents advanced protocol which has basic frame format and data flow for the medium/small scale DAS, and the procedure of the developing sequence.

  • PDF

Improvement of IS-IS Protocol for TICN Tactical Backbone (TICN 전술백본망을 위한 IS-IS 프로토콜 성능 개선)

  • Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.996-1002
    • /
    • 2011
  • Recently Korea Army are developing the TICN(Tactical Information Communication Network) which is the next army tactical communication system. The TICN tactical backbone's ability is very important. So analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, previous paper analysed routing protocol efficiency index and compared to superiority of the OSPF and IS-IS protocols in the tactical environment. Conclusively IS-IS protocol was more suitable for TICN backbone routing protocol. As follow-up study of previous paper, this paper try to find the proper parameters of IS-IS protocol in order to improve the performance of IS-IS protocol as a TICN tactical backbone protocol under the tactical environments. Finally it selected four time-parameters of IS-IS protocol, those can improve performance of the protocol.

A Design and Implementation of IPv6 LAN (IPv6 프로토콜 LAN 설계 및 구축)

  • 김상범;김두석
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.481-484
    • /
    • 2000
  • In this paper, we describe the design and implementation of IPv6 LAN. The legacy protocol for Internet is IPv4(IP version 4). The ability of IPv4 is not enough for modern real time multimedia communication services. So IPv6(IP version 6) protocol was suggested to resolve the problems of IPv4. We implemented IPv6 LAN using sTLA(sub Top Level Aggregation identifier) address and KOREN(KOrea Research and Experimental Network). Our IPv6 LAN is connected with 6TAP(Chicago), WIDE(Tokyo), and SingAREN(Singapore). We used a dedicated router, Windows 2000 PC host FreeBSD PC host, Solaris 7 workstation and Solaris 8 workstation for IPv6 NDP(Neighbor Discovery Protocol) protocol test. To support all data services including voice and video, IP protocol should be enhanced because the characteristics of modern network services are requiring QoS(Quality of Service) functions, auto-configuration, security, mobility and so on. So a new IP protocol, IPv6, has been developing to meet the requirements. In this paper, we introduce the implementation method and configuration information of IPv6 LAN.

  • PDF

Development and Evaluation of an Enteral Nutrition Protocol for Dysphagia in Patients with Acute Stroke (연하 곤란이 동반된 급성 뇌졸중 환자를 위한 장관 영양 프로토콜 개발 및 효과)

  • Yoo, Sung-Hee;Kim, So-Sun
    • Journal of Korean Academy of Nursing
    • /
    • v.44 no.3
    • /
    • pp.280-293
    • /
    • 2014
  • Purpose: The study was done to develop an evidence-based enteral nutrition (EN) protocol for effective nutritional support for dysphagia in patients with acute stroke, and to evaluate effects of this protocol on clinical outcomes. Methods: A methodological study was used to develop the EN protocol and a quasi-experimental study to verify the effectiveness of the protocol. The preliminary EN protocol was drawn by selecting recommendations from previous well-designed EN guidelines, and then developing additional recommendations based on high-quality evidence. Content validation was assessed by an expert group, and clinical applicability by care providers and patients. The scale-level content validity index of the final EN protocol was 0.99. Assessment was done of differences in percentage of caloric goals achieved and presence of undernutrition, aspiration pneumonia, and gastrointestinal (GI) complications after application of the EN protocol. Results: In the EN protocol group, the percentage of caloric goals achieved ($R^2=.24$, p=.001) and the reduction of GI complications (p=.045) were significantly improved, but the presence of undernutrition (p=.296) and aspiration pneumonia (p=.601) did not differ from the usual care group. Conclusion: Results indicate that the new EN protocol for dysphagia in patients with acute stroke significantly increased their nutritional intake and reduced GI complications.